Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:20
Static task
static1
General
-
Target
006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe
-
Size
1.0MB
-
MD5
ad325f21d5b3e0f51c31e3d7eb7667b8
-
SHA1
d466814c9882c8604a84f13d83844a64c29dad64
-
SHA256
006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7
-
SHA512
2a98f2285e6a89bede746e519019531b83fd6e014c1fb7f2ef175ddaa2c840b2bac38685335e2acafe17a94f94fdf7b578aa2ead24df9ea8050030c17d206bd8
-
SSDEEP
24576:+yAmlruDTZ+NrX7/K6t58ONhDtSFJjRAyiboZ85Eknm:NAmlruD9MrrP7DtSzdAyiboZ857
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it766915.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it766915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it766915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it766915.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it766915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it766915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it766915.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr146800.exelr154736.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation jr146800.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lr154736.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zikp9653.exezitv1435.exeit766915.exejr146800.exe1.exekp178198.exelr154736.exeoneetx.exeoneetx.exeoneetx.exepid process 1352 zikp9653.exe 540 zitv1435.exe 3932 it766915.exe 5108 jr146800.exe 2892 1.exe 2672 kp178198.exe 4724 lr154736.exe 4464 oneetx.exe 1424 oneetx.exe 3384 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3796 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it766915.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it766915.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zikp9653.exezitv1435.exe006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zikp9653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zikp9653.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitv1435.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zitv1435.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4636 5108 WerFault.exe jr146800.exe 3524 4724 WerFault.exe lr154736.exe 4676 4724 WerFault.exe lr154736.exe 2784 4724 WerFault.exe lr154736.exe 5080 4724 WerFault.exe lr154736.exe 4424 4724 WerFault.exe lr154736.exe 2336 4724 WerFault.exe lr154736.exe 2080 4724 WerFault.exe lr154736.exe 3536 4724 WerFault.exe lr154736.exe 4888 4724 WerFault.exe lr154736.exe 1816 4724 WerFault.exe lr154736.exe 4432 4464 WerFault.exe oneetx.exe 1172 4464 WerFault.exe oneetx.exe 4840 4464 WerFault.exe oneetx.exe 2264 4464 WerFault.exe oneetx.exe 4124 4464 WerFault.exe oneetx.exe 4700 4464 WerFault.exe oneetx.exe 4440 4464 WerFault.exe oneetx.exe 3868 4464 WerFault.exe oneetx.exe 404 4464 WerFault.exe oneetx.exe 1740 4464 WerFault.exe oneetx.exe 4696 4464 WerFault.exe oneetx.exe 4824 4464 WerFault.exe oneetx.exe 2668 1424 WerFault.exe oneetx.exe 1080 1424 WerFault.exe oneetx.exe 1516 1424 WerFault.exe oneetx.exe 4448 4464 WerFault.exe oneetx.exe 1216 4464 WerFault.exe oneetx.exe 4280 4464 WerFault.exe oneetx.exe 3128 3384 WerFault.exe oneetx.exe 3424 3384 WerFault.exe oneetx.exe 4912 3384 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it766915.exekp178198.exe1.exepid process 3932 it766915.exe 3932 it766915.exe 2672 kp178198.exe 2892 1.exe 2892 1.exe 2672 kp178198.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it766915.exejr146800.exekp178198.exe1.exedescription pid process Token: SeDebugPrivilege 3932 it766915.exe Token: SeDebugPrivilege 5108 jr146800.exe Token: SeDebugPrivilege 2672 kp178198.exe Token: SeDebugPrivilege 2892 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr154736.exepid process 4724 lr154736.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exezikp9653.exezitv1435.exejr146800.exelr154736.exeoneetx.exedescription pid process target process PID 3260 wrote to memory of 1352 3260 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe zikp9653.exe PID 3260 wrote to memory of 1352 3260 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe zikp9653.exe PID 3260 wrote to memory of 1352 3260 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe zikp9653.exe PID 1352 wrote to memory of 540 1352 zikp9653.exe zitv1435.exe PID 1352 wrote to memory of 540 1352 zikp9653.exe zitv1435.exe PID 1352 wrote to memory of 540 1352 zikp9653.exe zitv1435.exe PID 540 wrote to memory of 3932 540 zitv1435.exe it766915.exe PID 540 wrote to memory of 3932 540 zitv1435.exe it766915.exe PID 540 wrote to memory of 5108 540 zitv1435.exe jr146800.exe PID 540 wrote to memory of 5108 540 zitv1435.exe jr146800.exe PID 540 wrote to memory of 5108 540 zitv1435.exe jr146800.exe PID 5108 wrote to memory of 2892 5108 jr146800.exe 1.exe PID 5108 wrote to memory of 2892 5108 jr146800.exe 1.exe PID 5108 wrote to memory of 2892 5108 jr146800.exe 1.exe PID 1352 wrote to memory of 2672 1352 zikp9653.exe kp178198.exe PID 1352 wrote to memory of 2672 1352 zikp9653.exe kp178198.exe PID 1352 wrote to memory of 2672 1352 zikp9653.exe kp178198.exe PID 3260 wrote to memory of 4724 3260 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe lr154736.exe PID 3260 wrote to memory of 4724 3260 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe lr154736.exe PID 3260 wrote to memory of 4724 3260 006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe lr154736.exe PID 4724 wrote to memory of 4464 4724 lr154736.exe oneetx.exe PID 4724 wrote to memory of 4464 4724 lr154736.exe oneetx.exe PID 4724 wrote to memory of 4464 4724 lr154736.exe oneetx.exe PID 4464 wrote to memory of 4904 4464 oneetx.exe schtasks.exe PID 4464 wrote to memory of 4904 4464 oneetx.exe schtasks.exe PID 4464 wrote to memory of 4904 4464 oneetx.exe schtasks.exe PID 4464 wrote to memory of 3796 4464 oneetx.exe rundll32.exe PID 4464 wrote to memory of 3796 4464 oneetx.exe rundll32.exe PID 4464 wrote to memory of 3796 4464 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe"C:\Users\Admin\AppData\Local\Temp\006f8f2c5e501794f3600b77ece0ec68adf65513c6be9701a4e820eaac0600f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikp9653.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikp9653.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zitv1435.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zitv1435.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it766915.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it766915.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr146800.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr146800.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 13885⤵
- Program crash
PID:4636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp178198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp178198.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr154736.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr154736.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 6883⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 7683⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 8003⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 9643⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 9923⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 9923⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 12203⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 12323⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 13203⤵
- Program crash
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 6964⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 8604⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 8964⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10564⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10764⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10764⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10564⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 9964⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 9004⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 9924⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 12564⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11364⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 16044⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 13684⤵
- Program crash
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 16284⤵
- Program crash
PID:4280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 7123⤵
- Program crash
PID:1816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5108 -ip 51081⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4724 -ip 47241⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4724 -ip 47241⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4724 -ip 47241⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4724 -ip 47241⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4724 -ip 47241⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4724 -ip 47241⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4724 -ip 47241⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4724 -ip 47241⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4724 -ip 47241⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4724 -ip 47241⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4464 -ip 44641⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4464 -ip 44641⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4464 -ip 44641⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4464 -ip 44641⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4464 -ip 44641⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4464 -ip 44641⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4464 -ip 44641⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4464 -ip 44641⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4464 -ip 44641⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4464 -ip 44641⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4464 -ip 44641⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4464 -ip 44641⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 3962⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 4402⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 4722⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1424 -ip 14241⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1424 -ip 14241⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1424 -ip 14241⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4464 -ip 44641⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4464 -ip 44641⤵PID:704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4464 -ip 44641⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 3962⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 4402⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 4402⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3384 -ip 33841⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3384 -ip 33841⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3384 -ip 33841⤵PID:2336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD5da34555f3ae83ffba1696ed5a060438d
SHA192e41662bde1acf305326201c0fc381d1711477e
SHA256470937730925dee3fdd74493cf8c95a3e9e7e1d7210575b46d3152cd7075dbbd
SHA51254158dbe6fc9682068b522d2635bc932de57dc4a3bd5485fd6c125c4a424bb284fd8c2a80cad0e03d18177d90c17238bcbbeed69b80ad57371b194fdf3332a73
-
Filesize
723KB
MD5da34555f3ae83ffba1696ed5a060438d
SHA192e41662bde1acf305326201c0fc381d1711477e
SHA256470937730925dee3fdd74493cf8c95a3e9e7e1d7210575b46d3152cd7075dbbd
SHA51254158dbe6fc9682068b522d2635bc932de57dc4a3bd5485fd6c125c4a424bb284fd8c2a80cad0e03d18177d90c17238bcbbeed69b80ad57371b194fdf3332a73
-
Filesize
169KB
MD5b062565e306eab57a2c397866e43cd79
SHA11194a426cff5efa85d6e3ad92f20a30ec1c37e7b
SHA256cb56185b303fb074770bc43fc8cb43495f5660988464c0c25643b20e6074a5b2
SHA5127be7a3c61a733b5a4de3eb109fe6d262a07625acd06de268fc146a1560dfdfd17e898490c8ed2f162bde7d5dc0de97952465c73eff51d82dcd1376a66ce2859a
-
Filesize
169KB
MD5b062565e306eab57a2c397866e43cd79
SHA11194a426cff5efa85d6e3ad92f20a30ec1c37e7b
SHA256cb56185b303fb074770bc43fc8cb43495f5660988464c0c25643b20e6074a5b2
SHA5127be7a3c61a733b5a4de3eb109fe6d262a07625acd06de268fc146a1560dfdfd17e898490c8ed2f162bde7d5dc0de97952465c73eff51d82dcd1376a66ce2859a
-
Filesize
569KB
MD5641435ce3264165d9d80552c8059e011
SHA18d74b153f7492da2d7a65aafeef9eca15911cca0
SHA2568a13cd11e85dc3d626cde11f271354f8081cbf905a350e877ea3d10f0131df31
SHA51276daa1626019552a849b18057547d21e57d50a89715e6b1eac05641cbf7cb2a4d1f8a5752bdaae08cd4b3f51122aa3c8f31d4a0998e31c56f5d5c964de70b8b1
-
Filesize
569KB
MD5641435ce3264165d9d80552c8059e011
SHA18d74b153f7492da2d7a65aafeef9eca15911cca0
SHA2568a13cd11e85dc3d626cde11f271354f8081cbf905a350e877ea3d10f0131df31
SHA51276daa1626019552a849b18057547d21e57d50a89715e6b1eac05641cbf7cb2a4d1f8a5752bdaae08cd4b3f51122aa3c8f31d4a0998e31c56f5d5c964de70b8b1
-
Filesize
11KB
MD58dd706a687ea3cf2322f398c156d4351
SHA17778f6cb9f40430c837040d6534954c233834f19
SHA256d46797a4b65211e1cd92e515d33fa400d4555d6ecb5d223d76bb00446cdeb4d2
SHA512a4a5a18945d00b7ddf983d8db20253080a9c248c84c661f394774216dd3875c53949c1f3d346816f8dc144888d28e78c133f4f44ea0d54012dc9f346534ac54e
-
Filesize
11KB
MD58dd706a687ea3cf2322f398c156d4351
SHA17778f6cb9f40430c837040d6534954c233834f19
SHA256d46797a4b65211e1cd92e515d33fa400d4555d6ecb5d223d76bb00446cdeb4d2
SHA512a4a5a18945d00b7ddf983d8db20253080a9c248c84c661f394774216dd3875c53949c1f3d346816f8dc144888d28e78c133f4f44ea0d54012dc9f346534ac54e
-
Filesize
588KB
MD5fa88a7a2ba9b768715e650766d2c1a7b
SHA19d50a74e1a5c3515354e34be3bfb2dc349645832
SHA2560e0bbcf3ae78f27d85d46f0ff38842cc3fc540bc913a708f077ccbe982e9e294
SHA5123e2871b77e0dd694396169268594cf59afd574f0256df0f50c2f055eb96316530d35caab1fe08eb72aff56d91349dec29a7ef31feddcd09d0a7ad60e621e5682
-
Filesize
588KB
MD5fa88a7a2ba9b768715e650766d2c1a7b
SHA19d50a74e1a5c3515354e34be3bfb2dc349645832
SHA2560e0bbcf3ae78f27d85d46f0ff38842cc3fc540bc913a708f077ccbe982e9e294
SHA5123e2871b77e0dd694396169268594cf59afd574f0256df0f50c2f055eb96316530d35caab1fe08eb72aff56d91349dec29a7ef31feddcd09d0a7ad60e621e5682
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1